Tools required for importing certificates into the keystore
In order to perform the tasks in this scenario, the following tools are required:
- A certificate management tool for generating the keypair and creating the certificate request (CSR). This can be any tool. OpenSSL is used in this scenario, it can be obtained at http://www.openssl.org.
- A tool to import the certificate and the private key into the Tivoli Provisioning Manager keystore. Use the IBM® tool, KeyMan. It can be obtained at http://www.alphaworks.ibm.com/tech/keyman/download.
Complete the following steps to import a certificate from VeriSign into Tivoli Provisioning Manager:
- Creating the keypair.
- Creating a certificate request.
- Exporting the key entry.
- Obtaining the certificate authority certificate.
- Importing the key entry into the keystore.
- Importing the certificates into the keystore.
- Configuring WebSphere Application Server for SSL communication.
- Configuring device manager service properties.
Creating the keypair
The private key must be created before you can request the certificate from VeriSign. The private key decrypts the messages that are encrypted by the public key during the SSL handshake between the Tivoli Provisioning Manager server and the client.
Keep the private key in a safe place. The SSL communication is compromised if the private key is known by someone else.
Generate the private key using the following command:
openssl genrsa -des3 1024>VeriSign.keyThe keypair is created in the VeriSign.key file.
Creating a certificate request
Create the certificate request using openSSL. Once the request is created, the certificate will be obtained from VeriSign.
Note: The options in the commands may be different for your scenario. Consult the openssl documentation for more details.
When the enrollment form is completed, VeriSign will email the certificate to you. The certificate will be sent in the base-64 encoded format.
Exporting the key entry
The certificate and the private key need to be exported so that they can be transported and imported into other keystores. Export the certificate and private key pair into PKCS#12 format. The exported key entry will be imported into the Tivoli Provisioning Manager keystore so that it can be used for SSL communication.
Export the key entry with OpenSSL by running the following command:
openssl pkcs12 -export -in cert.cer -inkey $PWD/VeriSign.key -name "Versign Cert" -out Vcert.p12
The exported file is called Vcert.p12 and is in PKCS#12 format.
Importing the key entry into the keystore
Prerequisite: Create a backup copy of the Tivoli Provisioning Manager keystore, agentManagerKeys, before making any changes to the file.
Use the IBM KeyMan tool to import the Vcert.p12 key entry into the Tivoli Provisioning Manager keystore. If you have not yet installed KeyMan, download and install the tool from this Web site: http://www.alphaworks.ibm.com/tech/keyman/download
After the KeyMan is successfully installed, perform the following steps:
Leave the keystore open and continue to import the certificates into the keystore.
Importing the certificates into the keystore
After you import the Vcert.p12 key entry into the keystore, you need to import the chaining certificates that you downloaded earlier. The chaining includes an intermediate and root certificate authority certificate:
- Root CA Certificate: VeriSign Class 3 Public Primary CA.
- Intermediate Certificate: Secure Site/Managed PKI for SSL Standard Intermediate CA Certificate.
To import the chaining certificates:
The certificates have now been imported into the keystore.
Configuring WebSphere Application Server for SSL communication
After the real certificate is stored in the keystore, additional configuration is required in WebSphere Application Server so that the Java™ Secure Socket Extension (JSSE) can present the intended certificate to the user, or Web browser, instead of choosing a certificate randomly in the keystore. The Java Secure Socket Extension (JSSE) are packages that allow for secure Internet communications.
To perform the required configurations for WebSphere Application Server:
Configuring device manager service properties
When you use a new certificate, some configuration is required for the device manager service properties so that it recognizes the purchased VeriSign certificate.
After Tivoli Provisioning Manager is installed, device manager service is configured to use the agentKeys.jks and agentTrust.jksSSL repertoires in %WAS_HOME%\properties\DMSSLConfig.properties:
TPM_KEYSTORE_LOCATION=C:\\Program Files\\ibm\\tivoli\\tpm\\cert\\agentKeys.jk TPM_KEYSTORE_PASSWORD=[xor] 0uHh8VTZu6WrlpvRMIrAzg== TPM_TRUSTSTORE_LOCATION=C:\\Program Files\\ibm\\tivoli\\tpm\\cert\\agentTrusts.jks TPM_TRUSTSTORE_PASSWORD=[xor] 0uHh8VTZu6WrlpvRMIrAzg==
To configure device manager service to use the new certificate, update the keystore and truststore location to use theagentManagerKeys.jks and agentManagerTrust.jks SSL repertoires:
TPM_KEYSTORE_LOCATION= C:\\Program Files\\ibm\\AgentManager\\certs\\agentManagerKeys.jks TPM_KEYSTORE_PASSWORD=think4me TPM_TRUSTSTORE_LOCATION= C:\\Program Files\\ibm\\AgentManager\\certs\\agentManagerTrust.jks TPM_TRUSTSTORE_PASSWORD=think4me
The properties are updated so that device manager service recognizes the new certificates.
Source: http://publib.boulder.ibm.com/infocenter/tivihelp/v20r1/index.jsp?topic=%2Fcom.ibm.tivoli.tpm.sec.doc%2Fsecurity%2Ftsec_verisigncert.html
No comments:
Post a Comment